(Aster)-picking through the pieces of short URL services An - - PowerPoint PPT Presentation

aster picking through the pieces of short url services
SMART_READER_LITE
LIVE PREVIEW

(Aster)-picking through the pieces of short URL services An - - PowerPoint PPT Presentation

(Aster)-picking through the pieces of short URL services An investigation into the maliciousness of short URLs Robert Diepeveen & Peter Boers 2016 Motivation Obfuscation Brute force Uniform sample Contributions:


slide-1
SLIDE 1

(Aster)-picking through the pieces of short URL services

An investigation into the maliciousness of short URLs

Robert Diepeveen & Peter Boers 2016

slide-2
SLIDE 2

Motivation

  • Obfuscation
  • Brute force
  • Uniform sample
  • Contributions:

– Comparison between services – Observation of locality based adware network

slide-3
SLIDE 3

Research questions:

  • What portion of the short URL services are

used for malicious purposes and what does the abuse look like?

– Which service provides proportionally the most

short URLs flagged as malicious?

– What properties can be observed in encountered

malicious sites?

slide-4
SLIDE 4

Which services are looked into?

  • Previous work found the most popular services
  • Alexa.com
  • “Well known”

– TinyURL – bitly – goo.gl

  • t.co, not investigated
slide-5
SLIDE 5

How do you classify a site as malicious?

  • Google Safe Browse

– Malware – Phishing – “Unwanted”

  • DNSBL

– Domain blacklist – IP blacklist

  • Other methods:

– PhishTank

slide-6
SLIDE 6

What else is interesting to know about the URLs that are online?

  • Short URLs

– Creation date – Clicks – Referrers

  • Long URLs

– SSL info – Malicious classification – Server Headers (Last Modified, Server, Status Code) – Script links – Page Size

slide-7
SLIDE 7
slide-8
SLIDE 8

Uniform sampling

  • Key space approximates and hash lengths:

– Bitly: 3.5 trillion, max 7 – TinyURL: 80 billion, max 7 – Goo.gl: 58 billion, max 6

  • Random number generator to base conversion
  • [0-9A-Za-z]
  • Keyspace is not fully used
slide-9
SLIDE 9

Setup

  • 12 VMs
  • 4 days of data gathering
  • 96 threads per service

– Except goo.gl

  • 4 short URLs inserted in MongoDB per second
  • Average traffic:

– 8,52 Mbit/s out – 2,44 Mbit/s in

slide-10
SLIDE 10

The numbers

  • Approx 1.4 million short URLs encoutered

– TinyURL: 1,39 million visited. – Bitly: +/- 6 K visited. – Goo.gl: +/- 4K visited.

  • Malware – undetected hits

– TinyURL: 946 – Bitly: 2 – Goo.gl: 0

slide-11
SLIDE 11

The numbers (2)

Service Undetected Detected Total

Percentage

TinyURL 946 70,302 71,248 5.17% Bitly 2 1 3 +/- 0.05% Goo.gl 4 4 +/- 0.01% Totals 948 70,307 71,255

slide-12
SLIDE 12

asterpix.com

Domain Count www.asterpix.com 495 video.asterpix.com 113 www.tagvn.com 75 www.filelodge.com 57 keyknowhow.com 23 hurl.content.loudeye.com 16 static.zangocash.com 14 www.perfectporridge.com 13 www.content.loudeye.com 5 Small counts (<= 4) 137

slide-13
SLIDE 13

What is asterpix.com?

  • Origins in 2006 as a video sharing site
  • Short URLs are created during that period

– video.asterpix.com/v/<ID>/<Title>/ – www.asterpix.com/console/?avi=<ID>

  • 2009: links and short URLs “die”
  • 2015: malware registered
slide-14
SLIDE 14

Taxonomy

  • Encountered a dutch site during first visit.
  • How does locality influence redirection?

– Asia – America – Europe

  • Three phases

– Entry – Redirection – Hand off

slide-15
SLIDE 15

The phases

  • Entry

– Where is the visitor from? – Has he visited in the past?

  • Redirection

– Typical JS redirection to obfuscate paths – All over the world and at least 4 hops – Depending on location of visitor

  • Hand Off

– Catered to the visitor in language and offering

slide-16
SLIDE 16

What was observed?

  • One known entry point
  • Two known non malicious landing pages
  • Eight known malicious landing pages

– Surveys – “Free” money – Vouchers

  • Overlapping redirect chains

– park.above.com – bidr.trellian.com – z[a-z].zeroredirect.com

slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21

Conclusion/Discussion

  • Significant amount of malicious sites TinyURL
  • Undetected rate more or less the same over the

services.

  • Proportionally more malicious long URLs at

TinyURL in total.

  • Sites change over time, short URLs remain

active

– Unable to see if this is actively abused

  • Locality based redirection observed

– Block secondary/tertiary redirectors.

slide-22
SLIDE 22

Future work

  • The “repurposing” of short URLs and its abuse
  • The effectiveness of blocking underlying

redirectors

  • A further case study into locality based adware

networks to find commonalities

  • Optimization of the search for bitly and goo.gl
  • Look into smaller, lesser known providers.